Tags: forensics 

Rating:

Again the give us the investigation part almost complete, we know that this is a memory dump and, as per the svchost process, that is a windows.

There is also a clue about using volatility, a really useful tool for this kind of challenges, I recommend you to check it out if you don't know it already.

[More](https://blog.kalrong.net/en/2016/12/14/seccon-2016-memory-analysis-forensic-100/)

Original writeup (https://blog.kalrong.net/en/2016/12/14/seccon-2016-memory-analysis-forensic-100/).